{"id":3985,"date":"2025-12-02T10:01:56","date_gmt":"2025-12-02T10:01:56","guid":{"rendered":"https:\/\/all4sec.es\/blog\/?p=3985"},"modified":"2025-12-02T10:01:57","modified_gmt":"2025-12-02T10:01:57","slug":"ctem-un-enfoque-proactivo-para-priorizar-amenazas","status":"publish","type":"post","link":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/","title":{"rendered":"CTEM, un enfoque proactivo para priorizar amenazas"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-text-align-center\">En el mundo de la ciberseguridad, anticiparse a las amenazas se ha convertido en una necesidad indispensable para muchas organizaciones<\/h3>\n\n\n\n<p>Esta preparaci\u00f3n conlleva un modelo de recogida de informaci\u00f3n y toma de decisiones de forma continua que, bien llevadas, pueden atenuar el impacto de ataques imprevistos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Continuous Threat Exposure<\/strong><strong> Management<\/strong><\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-1-markus-winkler-KI6YCm93m2Y-unsplash-1024x683.jpg\" alt=\"\" class=\"wp-image-3990\" style=\"width:231px;height:auto\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-1-markus-winkler-KI6YCm93m2Y-unsplash-1024x683.jpg 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-1-markus-winkler-KI6YCm93m2Y-unsplash-300x200.jpg 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-1-markus-winkler-KI6YCm93m2Y-unsplash-768x512.jpg 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-1-markus-winkler-KI6YCm93m2Y-unsplash-1536x1024.jpg 1536w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-1-markus-winkler-KI6YCm93m2Y-unsplash.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>En este contexto, un nuevo concepto denominado <strong>Continuous Threat Exposure Management<\/strong> (<a href=\"https:\/\/www.gartner.com\/en\/articles\/how-to-manage-cybersecurity-threats-not-episodes\">CTEM<\/a>) ha tomado protagonismo. Se trata de un enfoque que permite a las compa\u00f1\u00edas gestionar su exposici\u00f3n frente a ciber-amenazas imprevistas.<\/p>\n\n\n\n<p><strong>CTEM<\/strong> se centra en la identificaci\u00f3n y evaluaci\u00f3n de amenazas antes de que los atacantes puedan explotar las vulnerabilidades que permiten materializarlas.<\/p>\n\n\n\n<p>Una definici\u00f3n atractiva. Sin embargo, <em>\u00bfc\u00f3mo se traduce esto en una estrategia que sea pr\u00e1ctica y efectiva?<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>La monitorizaci\u00f3n como punto de partida<\/strong><\/h3>\n\n\n\n<p>Imagin\u00e9monos una compa\u00f1\u00eda que emplea herramientas como <a href=\"https:\/\/www.tenable.com\/\"><strong>Tenable.io<\/strong><\/a>, <a href=\"https:\/\/www.qualys.com\/\"><strong>Qualys<\/strong><\/a> o <a href=\"https:\/\/www.splunk.com\/\"><strong>Splunk<\/strong><\/a>. Hablamos de plataformas que permiten la recolecci\u00f3n de datos relacionados con la ciberseguridad al tiempo que escanean la red con objeto de detectar posibles vulnerabilidades en sus arquitecturas TI o en las configuraciones de sus equipos.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"409\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-3-Tenable-Qualys-Splunk.jpg\" alt=\"\" class=\"wp-image-3991\" style=\"width:279px;height:auto\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-3-Tenable-Qualys-Splunk.jpg 667w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-3-Tenable-Qualys-Splunk-300x184.jpg 300w\" sizes=\"(max-width: 667px) 100vw, 667px\" \/><\/figure><\/div>\n\n\n<p>Pero no solo se quedan ah\u00ed, tambi\u00e9n <strong>priorizan los riesgos identificados<\/strong>, en funci\u00f3n de su impacto potencial, permitiendo que los ingenieros tomen decisiones de acuerdo con la importancia de los eventos analizados.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Una visi\u00f3n pr\u00e1ctica<\/strong><\/h3>\n\n\n\n<p>El modelo resulta atractivo. Sin embargo, este tipo de soluciones en ocasiones adolecen de la <a href=\"https:\/\/thehackernews.com\/2024\/08\/ctem-in-spotlight-how-gartners-new.html\">visi\u00f3n pr\u00e1ctica que soporta un ciberataque real<\/a>, es decir, una medida de su verdadero impacto en la organizaci\u00f3n.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"111\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-8-Pentera.jpg\" alt=\"\" class=\"wp-image-3992\" style=\"width:261px;height:auto\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-8-Pentera.jpg 518w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-8-Pentera-300x64.jpg 300w\" sizes=\"(max-width: 518px) 100vw, 518px\" \/><\/figure><\/div>\n\n\n<p>Una propuesta innovadora en el \u00e1mbito de <strong>CTEM<\/strong>, y que incide en este aspecto, es <a href=\"https:\/\/pentera.io\/\"><strong>Pentera<\/strong><\/a><strong>. <\/strong>Se trata de un entorno que permite a las organizaciones realizar pruebas reales de <strong>pentesting automatizadas y continuas<\/strong> en el tiempo.<\/p>\n\n\n\n<p>Este enfoque no solo consigue identificar vulnerabilidades, sino tambi\u00e9n completar ataques reales, proporcionando una visi\u00f3n clara de c\u00f3mo un atacante explota las debilidades de una compa\u00f1\u00eda en funci\u00f3n de las medidas de protecci\u00f3n desplegadas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Mix de tecnolog\u00eda y procesos en CTEM<\/strong><\/h3>\n\n\n\n<p>La combinaci\u00f3n de estas <a href=\"https:\/\/all4sec.es\/blog\/index.php\/2025\/06\/04\/vulnerabilidades-dia-cero-esperar-lo-inesperado\/\">soluciones de tecnolog\u00edas<\/a> con un enfoque proactivo de <strong>CTEM<\/strong> permitir\u00eda a las organizaciones adaptarse r\u00e1pidamente a un contexto de amenazas en cambio constante.<\/p>\n\n\n\n<p>Pero los tecnol\u00f3gicos no son los \u00fanicos aspectos que considerar.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-5-data-security-9145391_1280-1024x1024.jpg\" alt=\"\" class=\"wp-image-3993\" style=\"width:234px;height:auto\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-5-data-security-9145391_1280-1024x1024.jpg 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-5-data-security-9145391_1280-300x300.jpg 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-5-data-security-9145391_1280-150x150.jpg 150w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-5-data-security-9145391_1280-768x768.jpg 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-5-data-security-9145391_1280.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Por ejemplo, la importancia de la <strong>exposici\u00f3n a amenazas<\/strong> a la que se enfrentan los empleados requiere tambi\u00e9n de no poca atenci\u00f3n. Entre esas amenazas est\u00e1n la ingenier\u00eda social o el incumplimiento, por ejemplo, de normas y procedimientos de actuaci\u00f3n definidos por la compa\u00f1\u00eda.<\/p>\n\n\n\n<p>Herramientas de <strong>concienciaci\u00f3n en ciberseguridad<\/strong> entran as\u00ed a formar parte de esta ecuaci\u00f3n de la proactividad, ayudando a las compa\u00f1\u00edas en la identificaci\u00f3n y reporte de otras posibles amenazas.<\/p>\n\n\n\n<p>Finalmente, y no menos importante, cabe recordar que cuando hablamos de <strong>CTEM<\/strong> no solo lo hacemos de tecnolog\u00eda y de comportamiento de usuarios. <strong>CTEM<\/strong> se conforma como una estrategia robusta de <a href=\"https:\/\/all4sec.es\/blog\/index.php\/2023\/09\/01\/automatizacion-de-servicios-de-hacking\/\">acciones proactivas<\/a> que incorpora tambi\u00e9n ejercicios y aplicaci\u00f3n de procedimientos de respuesta ante potenciales incidentes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>CTEM: una estrategia de ciberseguridad proactiva<\/strong><\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-4-security-5042249_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-3994\" style=\"width:309px;height:auto\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-4-security-5042249_1280-1024x682.jpg 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-4-security-5042249_1280-300x200.jpg 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-4-security-5042249_1280-768x512.jpg 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-4-security-5042249_1280.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>En definitiva, <strong>CTEM<\/strong> recoge un enfoque proactivo de ciberseguridad a trav\u00e9s de herramienta, <strong>procedimientos de trabajo y acciones de respuesta<\/strong> que coordinados pueden marcar la diferencia entre ser v\u00edctima real de un ciberataque o combatirlo desde la predisposici\u00f3n de contramedidas previamente planificadas.<\/p>\n\n\n\n<p>La conclusi\u00f3n principal pues es que, en el futuro, aquellas compa\u00f1\u00edas que integren <strong>CTEM<\/strong> en su estrategia global de ciberseguridad no solo estar\u00e1n mejor preparadas frente a futuras amenazas, sino que tambi\u00e9n podr\u00e1n innovar y crecer en un entorno digital que resulta cada vez m\u00e1s din\u00e1mico y desafiante.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Esta preparaci\u00f3n conlleva un modelo de recogida de informaci\u00f3n y toma de decisiones de forma continua que pueden atenuar el impacto de ataques imprevistos.<\/p>\n","protected":false},"author":3,"featured_media":3989,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CTEM, un enfoque proactivo para priorizar amenazas - all4sec.es<\/title>\n<meta name=\"description\" content=\"CTEM, un enfoque proactivo para priorizar amenazas. Anticiparse a las amenazas se ha convertido en una necesidad.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CTEM, un enfoque proactivo para priorizar amenazas - all4sec.es\" \/>\n<meta property=\"og:description\" content=\"CTEM, un enfoque proactivo para priorizar amenazas. Anticiparse a las amenazas se ha convertido en una necesidad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/\" \/>\n<meta property=\"og:site_name\" content=\"all4sec.es\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-02T10:01:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-02T10:01:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-6-jon-tyson-3I07zXmwouc-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1176\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juanjo Galan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juanjo Galan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/\",\"url\":\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/\",\"name\":\"CTEM, un enfoque proactivo para priorizar amenazas - all4sec.es\",\"isPartOf\":{\"@id\":\"https:\/\/all4sec.es\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-6-jon-tyson-3I07zXmwouc-unsplash.jpg\",\"datePublished\":\"2025-12-02T10:01:56+00:00\",\"dateModified\":\"2025-12-02T10:01:57+00:00\",\"author\":{\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9\"},\"description\":\"CTEM, un enfoque proactivo para priorizar amenazas. Anticiparse a las amenazas se ha convertido en una necesidad.\",\"breadcrumb\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#primaryimage\",\"url\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-6-jon-tyson-3I07zXmwouc-unsplash.jpg\",\"contentUrl\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-6-jon-tyson-3I07zXmwouc-unsplash.jpg\",\"width\":1920,\"height\":1176},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/all4sec.es\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CTEM, un enfoque proactivo para priorizar amenazas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/all4sec.es\/blog\/#website\",\"url\":\"https:\/\/all4sec.es\/blog\/\",\"name\":\"all4sec.es\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/all4sec.es\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9\",\"name\":\"Juanjo Galan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g\",\"caption\":\"Juanjo Galan\"},\"url\":\"https:\/\/all4sec.es\/blog\/index.php\/author\/juanjo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CTEM, un enfoque proactivo para priorizar amenazas - all4sec.es","description":"CTEM, un enfoque proactivo para priorizar amenazas. Anticiparse a las amenazas se ha convertido en una necesidad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/","og_locale":"es_ES","og_type":"article","og_title":"CTEM, un enfoque proactivo para priorizar amenazas - all4sec.es","og_description":"CTEM, un enfoque proactivo para priorizar amenazas. Anticiparse a las amenazas se ha convertido en una necesidad.","og_url":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/","og_site_name":"all4sec.es","article_published_time":"2025-12-02T10:01:56+00:00","article_modified_time":"2025-12-02T10:01:57+00:00","og_image":[{"width":1920,"height":1176,"url":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-6-jon-tyson-3I07zXmwouc-unsplash.jpg","type":"image\/jpeg"}],"author":"Juanjo Galan","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Juanjo Galan","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/","url":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/","name":"CTEM, un enfoque proactivo para priorizar amenazas - all4sec.es","isPartOf":{"@id":"https:\/\/all4sec.es\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#primaryimage"},"image":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#primaryimage"},"thumbnailUrl":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-6-jon-tyson-3I07zXmwouc-unsplash.jpg","datePublished":"2025-12-02T10:01:56+00:00","dateModified":"2025-12-02T10:01:57+00:00","author":{"@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9"},"description":"CTEM, un enfoque proactivo para priorizar amenazas. Anticiparse a las amenazas se ha convertido en una necesidad.","breadcrumb":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#primaryimage","url":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-6-jon-tyson-3I07zXmwouc-unsplash.jpg","contentUrl":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2025\/12\/CTEM-6-jon-tyson-3I07zXmwouc-unsplash.jpg","width":1920,"height":1176},{"@type":"BreadcrumbList","@id":"https:\/\/all4sec.es\/blog\/index.php\/2025\/12\/02\/ctem-un-enfoque-proactivo-para-priorizar-amenazas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/all4sec.es\/blog\/"},{"@type":"ListItem","position":2,"name":"CTEM, un enfoque proactivo para priorizar amenazas"}]},{"@type":"WebSite","@id":"https:\/\/all4sec.es\/blog\/#website","url":"https:\/\/all4sec.es\/blog\/","name":"all4sec.es","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/all4sec.es\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9","name":"Juanjo Galan","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g","caption":"Juanjo Galan"},"url":"https:\/\/all4sec.es\/blog\/index.php\/author\/juanjo\/"}]}},"_links":{"self":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/3985"}],"collection":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=3985"}],"version-history":[{"count":6,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/3985\/revisions"}],"predecessor-version":[{"id":3997,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/3985\/revisions\/3997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/media\/3989"}],"wp:attachment":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=3985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=3985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=3985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}